Author of the publication

Konzeption der Wirtschaftlichkeitsbewertung von komplexen Bauprojekten in Abhängigkeit von der Projektabwicklungsform

, , and . Tagungsband zum 32. BBB-Assistent:innentreffen 2023: 04.10.2023 - 06.10.2023, (2023)
DOI: 10.17185/DUEPUBLICO/79116

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Modeling and Verifying Physical Properties of Security Protocols for Wireless Networks., , , and . CSF, page 109-123. IEEE Computer Society, (2009)Distance Hijacking Attacks on Distance Bounding Protocols., , , and . IEEE Symposium on Security and Privacy, page 113-127. IEEE Computer Society, (2012)What Belongs Together Comes Together: Activity-centric Document Clustering for Information Work., , , and . IUI, page 60-70. ACM, (2016)Let's Get Physical: Models and Methods for Real-World Security Protocols., , , and . TPHOLs, volume 5674 of Lecture Notes in Computer Science, page 1-22. Springer, (2009)Upgrading Wireless Home Routers for Enabling Large-Scale Deployment of Cloudlets., , , , , and . MobiCASE, volume 162 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 12-29. Springer, (2015)Jasmin: High-Assurance and High-Speed Cryptography., , , , , , , , , and . ACM Conference on Computer and Communications Security, page 1807-1823. ACM, (2017)Strongly-Optimal Structure Preserving Signatures from Type II Pairings: Synthesis and Lower Bounds., , , , , and . Public Key Cryptography, volume 9020 of Lecture Notes in Computer Science, page 355-376. Springer, (2015)Transparency - Activity Theory-Guided Support for Information Work., and . CASFE, volume 970 of CEUR Workshop Proceedings, CEUR-WS.org, (2012)Topics in Software Industry Transformation Research: A Topic Analysis of Major IS Conferences., , , , and . ICSOB, volume 114 of Lecture Notes in Business Information Processing, page 128-140. Springer, (2012)Formal Reasoning about Physical Properties of Security Protocols., , , and . ACM Trans. Inf. Syst. Secur., 14 (2): 16:1-16:28 (2011)